Sciweavers

3516 search results - page 292 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
16 years 4 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
ISORC
1999
IEEE
15 years 8 months ago
Implementing the Real-Time Publisher/Subscriber Model on the Controller Area Network (CAN)
Designing distributed real-time systems as being composed of communicating objects offers many advantages with respect to modularity and extensibility of these systems. However, d...
Jörg Kaiser, Michael Mock
ER
2004
Springer
169views Database» more  ER 2004»
15 years 9 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
SOUPS
2006
ACM
15 years 10 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
BROADNETS
2006
IEEE
15 years 7 months ago
Efficient Integration of Web Services in Ambient-aware Sensor Network Applications
Sensor webs are heterogeneous collections of sensor devices that collect information and interact with the environment. They consist of wireless sensor networks that are ensembles ...
Isaac Amundson, Manish Kushwaha, Xenofon D. Koutso...